http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Virtual World-Based Information Security Learning: Design and Evaluation
Ryoo, Jungwoo,Lee, Dongwon,Techatassanasoontorn, Angsana A. 한국과학기술정보연구원 과학기술정보센터 2016 Journal of Information Science Theory and Practice Vol.4 No.3
There has been a growing interest and enthusiasm for the application of virtual worlds in learning and training. This research proposes a design framework of a virtual world-based learning environment that integrates two unique features of the virtual world technology, immersion and interactivity, with an instructional strategy that promotes self-regulatory learning. We demonstrate the usefulness and assess the effectiveness of our design in the context of information security learning. In particular, the information security learning module implemented in Second Life was incorporated into an Introduction to Information Security course. Data from pre- and post- learning surveys were used to evaluate the effectiveness of the learning module. Overall, the results strongly suggest that the virtual world-based learning environment enhances information security learning, thus supporting the effectiveness of the proposed design framework. Additional results suggest that learner traits have an important influence on learning outcomes through perceived enjoyment. The study offers useful design and implementation guidelines for organizations and universities to develop a virtual world-based learning environment. It also represents an initial step towards the design and explanation theories of virtual world-based learning environments.
Jungwoo Ryoo,Eun-A Park 한국정보과학회 2011 Journal of Computing Science and Engineering Vol.5 No.1
In this paper we applied our previously developed assessment framework to the data collected from an internet security readiness survey targeted at households. We used the assessment framework to compute an Internet Security Readiness index for each household, which was in turn derived from Internet Security Readiness capital, skill, and actual uptake/use of infrastructure indices. We then examined the relationships among overall Internet Security Readiness, and the capital, skill, and actual uptake/use of infrastructure related to Internet Security Readiness. In addition, we explored the influence of Internet usage level and experience on Internet Security Readiness.
IoE 환경에 적합한 보안 경고 디스플레이를 활용한 개인정보 보호 기법
류정우(Jungwoo Ryoo) 한국정보보호학회 2017 情報保護學會誌 Vol.27 No.1
최근, Internet of Everything (IoE)는 Internet of Things (IoT)의 영역을 급속히 확장하며 그 범위를 넓혀가고 있다. IoT가 여러 가지 다양한 센서들을 인터넷에 연결하는 기술이라면 IoE는 우리주변의 모든 기기들 (예를 들면 가전제품이나 보안 시스템)을 IoE와 아울러서 통합된 망을 구축함으로써 여러 가지 상승효과를 모색하는 정보산업의 새로운 흐름이라 할 수 있겠다. 하지만, IoE의 많은 장점에도 불구하고, 새롭게 개발되고 있는 기술이라는 특성상, 아직도 보완해야 될 점이 많은 것이 사실이다. 특히, IoE 환경의 경우, 가정이나 사무공간에서 연결되고 있는 기기나 장비들이 개인용품이 많다는 특성상 정보 보안에 문제가 생길 때 개인정보 유출의 우려가 클 수밖에 없는 것이 사실이다. 하지만, 많은 IoE 서비스 이용자들이 이런 보안상의 문제점들에 대해서 인지하지 못하고 있는 것이 현실이다. 따라서 본 논문에서는 보안경고 디스플레이 기술을 활용하여 일반인들에게 개인정보 유출에 대한 경각심을 일으키고 구체적인 대응방안을 모색해 볼 수 있도록 유도하는 디자인 기법들의 가능성들을 모색해 보고자 한다.
A Survey of Security and Privacy Challenges in Cloud Computing
Yuhong Liu,Yan (Lindsay) Sun,Jungwoo Ryoo,Syed Rizvi,Athanasios V. Vasilakos 한국정보과학회 2015 Journal of Computing Science and Engineering Vol.9 No.3
While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions
Liu, Yuhong,Sun, Yan Lindsay,Ryoo, Jungwoo,Rizvi, Syed,Vasilakos, Athanasios V. Korean Institute of Information Scientists and Eng 2015 Journal of Computing Science and Engineering Vol.9 No.3
While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.
Wrong Siren! A Location Spoofing Attack on Indoor Positioning Systems: The Starbucks Case Study
Cho, Junsung,Yu, Jaegwan,Oh, Sanghak,Ryoo, Jungwoo,Song, JaeSeung,Kim, Hyoungshick IEEE 2017 IEEE communications magazine Vol.55 No.3
<P>The Internet of Things interconnects a mass of billions devices, from smartphones to cars, to provide convenient services to people. This gives immediate access to various data about the objects and the environmental context - leading to smart services and increased efficiency. A number of retail stores have started to adopt IoT enabled services to attract customers. In particular, thanks to indoor proximity technologies, it is possible to introduce location-based smart services to customers, for example, transmitting identifiable signals that represent the locations of stores. In this article, we investigate a potential security risk involved in such technologies: physical signals used as identifiers can be captured and forged easily with today's widely available IoT software for implementing location spoofing attacks. We highlight this security risk by providing a case study: an in-depth security analysis of the recently launched Starbucks service called Siren Order.</P>